摘要:
The invention relates to a secure data processing method comprising the steps of generating (E204; E304) a first random value (A1); executing (E206; E306) a first cryptographic algorithm (FK) using the first random value (A1); generating (E208; E308) a second random value (A2); executing (E210; E310) a second cryptographic algorithm (FK; GK) using the second random value (A2); and generating a result (V) to verify that the first algorithm (FK) was properly executed.
摘要:
The invention concerns a method for reproducing digital content including the following steps: receiving (E222) an identifier (Id′) of the digital content from a secure electronic entity; extracting (E226) a digital watermark of the digital content; controlling (E232) the reproduction of the content based on a comparison between the extracted watermark and the identifier. The invention concerns a reproducing device, an electronic entity and related systems.
摘要:
A data processing method comprises the following steps: determining a first result data word from a first input data word and a first secret data word; obtaining a first compressed data word from the first result data word or the first input data word using a compression algorithm; determining a second result data word from a second input data word and a second secret data word; obtaining a second compressed data word from the second result data word using the compression algorithm; comparing the first compressed data word and the second compressed data word.
摘要:
An exchange of information between a communication entity e.g. a mobile telephone and the operator server upon which it is dependent, in order to carry out authentication operations by exchanging keys and using cryptography algorithms. According to the invention, an algorithm is used, comprising: algorithmic treatments using, as input data, all or part of a random number and operating keys derived from two keys, and a combined treatment using data derived from algorithmic treatments in order to provide results to enable the linkage.
摘要:
The invention concerns a secure electronic entity (11) containing a time measuring unit (18) and comprising a unit (21) for certifying an information concerning a date or a time interval, the certifying unit (21) receiving from the time measuring unit (18) data concerning the date or the time interval and producing certification data of the information concerning a date or a time interval addressed to and external entity. The invention is applicable in particular to microcircuit cards.
摘要:
A method for protecting an electronic entity with encrypted access, against DFA (Differential Fault Analysis) attacks which includes: storing the result of a selected step (Rm, Kn) of an iterative process forming part of the cryptographic algorithm and in performing once more at least part of the steps of the iterative process up to a new computation of a result corresponding to the one which has been stored, comparing the two results and denying distribution of an encrypted message (MC) if they are different.
摘要:
Devices and methods for masking and unmasking sensitive data, based on a standard cryptographic algorithm defining a ciphering algorithm, and a deciphering algorithm using more resources than the ciphering algorithm are described. The masking of sensitive data is done by applying the deciphering algorithm to the sensitive data to obtain masked sensitive data. The unmasking of the masked sensitive data is done by applying the ciphering algorithm to the masked sensitive data to obtain sensitive data in plain form.
摘要:
A secure data processing method includes the following steps: padding (E206) a memory area (MAC′) with a pad value (A); writing (E208) a first datum in the memory area (MAC′); in the area, reading (E210) a second datum with at least one part of the first datum as it was written in the memory area (MAC′); and executing an operation (E210) using the second datum.
摘要:
A microcircuit card (200) includes means for detecting an attack on the card, and command means (130) capable of blowing a fuse (250) of the card when an attack is detected.
摘要:
A method for securing a program against attacks by error, i.e. in a chip card, wherein at least one jump instruction, including a relative address chosen from a plurality of possible relative addresses, is identified in the program, wherein the at least one jump instruction makes it possible to reach a targeted address inside the memory area extending before and after the jump instruction and regrouping the plurality of possible relative addresses, inside the memory area, wherein an instruction to be preserved is identified and, in order to secure at least the instruction, at least one first non-operative batch including at least one instruction is inserted, the insertion being carried out in such a way as to ensure that the insertion is compatible with maintenance of the address targeted by the jump instruction inside the memory area and that the insertion is compatible with the normal running of the program.